Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz 312-50 (CEH v6)

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz 312-50 (CEH v6)

Which of the following snort rules look for FTP root login attempts?

What is the mostly likely way the attacker has been able to modify the price?

Why is Social Engineering considered attractive by hackers and commonly done by experts in the field?

What kind of software could Harold to use to track her activities online, and send Harold an email of her activity once a day so he can see what she has been up to?

What is Bob supposed to find an active session due to the high level of traffic on the network?

What would you call such a host when the system is on the public side of the demilitarized zone, unprotected by a firewall or filtering router?

How would you describe an attack where an attacker attempts to deliver the payload over multiple packets over long periods of time?

Unauthorized users are still able to connect to the wireless network. Why do you think this is possible?

which is based on the European Institute for Computer Antivirus Research format that can be detected by the AV software.

In the context of Windows Security, what is a 'null' user?

Posts navigation

Previous 1 … 113 114 115 … 201 Next
Equizzing
    Privacy Policy

© 2025 Equizzing